The Avenger. Usage and Release Notes
|
|
- Doreen Butler
- 5 years ago
- Views:
Transcription
1 The Avenger Usage and Release Notes The Avenger is a full-scriptable, kernel-level driver designed to remove highly persistent files and registry keys/values protected by entrenched malware. Basically this means that The Avenger is a program to which you give commands to execute (the script) consisting of files to delete, etc., which would otherwise be hard to delete because they were protected or in use by malicious software. With the recent proliferation of rootkits and other strongly-protected forms of malware, a tool like this one to remove deeply-entrenched files has become more and more necessary. The Avenger is currently at version 1. Every attempt has been made to ensure its safety, but it is provided with absolutely no warranty whatsoever and its safety cannot be 100% guaranteed! You use The Avenger at your own risk please use it only under qualified supervision. For assistance please contact me at Swandog46 [at] mvps [dot] org, or one of the helpers at one of the ASAP forums, such as SWI. Be forewarned! The Avenger is a VERY powerful program, designed to remove highly persistent files and registry keys. As a result, it can easily be misused. Certain misuses of this program could prevent your system from ever starting up again. Please be careful! (1 of 12)12/19/2007 2:47:01 AM
2 Usage and release notes for The Avenger are listed below, in four sections: (1) System requirements and program usage (2) Script syntax (3) Command line arguments and usage (4) License, credits, and acknowledgements (1) System Requirements and Program Usage System Requirements: 1) The Avenger will work ONLY on Windows 2000 and XP, and only on 32-bit versions! Please do NOT attempt to use it on any other operating system. It has not been tested on 64-bit platforms. 2) The Avenger must be run from a user account with administrator privileges. Program Usage: The Avenger may be downloaded from here, or from my main tools page. When run, the main Avenger window allows you to choose from one of three options for inputting a script to execute: (1) load a script from a file, (2) load a script from an internet URL, or (3) input a script manually. Clicking the Open File button or going to the File menu and choosing Open script file will allow you to (2 of 12)12/19/2007 2:47:01 AM
3 load a script from a file. Typing a URL into the Load script from Internet URL field will allow you to load a script from a URL (please note that you must include the prefix when loading scripts from URLs!). Selecting Input script manually and then clicking the magnifying glass icon: will allow you to type script commands directly for execution. If Load script from file or Load script from URL is selected, clicking the magnifying glass icon will allow you to view the current script in memory and edit it if desired. Clicking the green light icon: will begin execution of the script currently in memory. Clicking the stop icon: will quit the program. The log from the most recent use of The Avenger may be viewed by going to the File menu, and choosing Open log file. Finally, help and version information is available from the Help menu. After you have clicked on the green light to begin execution of a script, The Avenger will set itself up to run the next time you reboot your computer, and then will prompt you to restart immediately. After your system restarts, a log file should open with the results of Avenger s actions. This log file is located at % systemdrive%\avenger.txt, where %systemdrive% is a variable representing the main system drive of your computer (usually C:\ for most systems). The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archive to %systemdrive%\avenger\backup. zip. Registry backups will be inside this archive under the name backup.reg. (3 of 12)12/19/2007 2:47:01 AM
4 (2) Script Syntax The core of The Avenger is its script-processing functionality. As a result, I must discuss the syntax used in Avenger scripts. An Avenger script is composed of lines of plain text, containing one command directive per line. There are 11 commands in total that The Avenger recognizes. They are: 1) Comment: 2) Files to delete: 3) Files to replace with dummy: 4) Files to move: 5) Folders to delete: 6) Registry keys to delete: 7) Registry keys to replace with dummy: 8) Registry values to delete: 9) Registry values to replace with dummy: 10) Programs to launch on reboot: 11) Drivers to unload: Blank lines and whitespace in general including leading and trailing whitespace on command lines is ignored by The Avenger. (If you do not want whitespace to be stripped, you may enclose parts or all of any commands in quotation marks, which will override whitespace stripping.) All commands are caseinsensitive. The commands, respectively, do the following: 1) Comment: does nothing. Comment lines are so that (4 of 12)12/19/2007 2:47:01 AM
5 script-writers can put comments into their scripts. 2) Files to delete: deletes and backs up files listed (NOTE: this works only on files, not folders) 3) Files to replace with dummy: replaces files listed with empty dummy files, and backs up originals. 4) Files to move: moves files from a source location to a destination, backing up any existing destination files. This command will only work within drives/volumes (for example, do not try to move a file from D:\ to C:\ ; it will not work.) 5) Folders to delete: deletes and backs up folders listed (NOTE: this works only on folders, not files.) 6) Registry keys to delete: deletes and backs up registry keys listed. HKEY_LOCAL_MACHINE and HKEY_USERS are the only recognized registry hives, and either these long names or the abbreviations HKLM and HKU are acceptable. 7) Registry keys to replace with dummy: replaces all values under the selected registry key (recursively) with dummy values that means null strings for string values, and 0 for numeric values. 8) Registry values to delete: deletes and backs up specific registry values under registry keys as above. 9) Registry values to replace with dummy: replaces a single value under a registry key with a dummy as above. 10) Programs to launch on reboot: queues a program to run once at next reboot, to be able to extend Avenger to simple user-mode code and incorporate cleanup steps or larger malware fixes. 11) Drivers to unload: this is an experimental command, and should please be used sparingly. It will unload other system drivers, including kernel- and boot-level drivers. This process (5 of 12)12/19/2007 2:47:01 AM
6 requires TWO reboots, which will be automatically queued if any drivers to unload are listed. Please note that driver FILES are NOT automatically removed by this command. If you want files deleted in addition, you will have to add that yourself as a separate files to delete: command. One other important note: environmental variables such as % systemdrive%, %windir%, %temp%, or any other variable recognized by the command interpreter (including user-defined variables such as in a batch script) may be used in any Files commands (Files to delete:, Files to Replace with Dummy:, Files to move:, or also in Folders to delete: and Programs to launch on reboot: ). Because I know all of this is quite abstract, here is a concrete example of a functional script file: comment: I didn't really need to put in the comment: line since all leading lines not matching a command directive are interpreted as comments. But it is just to illustrate how comments work. After reading the Comment: directive above, The Avenger will ignore all subsequent lines until it finds another command directive. Please remember to put the colons : in when you put in command directives! Now I will add real commands so you can see sample syntax for each one. Files to delete: c:\windows\system32\badfile.dll %windir%\system32\badfile2.dll %systemdrive%\somefile.ext (6 of 12)12/19/2007 2:47:01 AM
7 Comment: Note the syntax of one file per line listed after the files to delete: command. Also note the use of environmental variables in the file names themselves. Files to replace with dummy: D:\somefile.ext FILES TO MOVE: C:\SOMESOURCEFILE c:\somedestinationfile C:\SOMESOURCEFILE c:\somedestinationfile Comment: Note the case insensitivity of the commands. Also note the syntax of the files to move: command, using the pipe to separate the source and destination paths. Whitespace is stripped before and after the pipe, up to any quotes that are found. Folders to Delete: C:\somefolder registry keys to delete: hklm\software\badkey hkey_local_machine\system\currentcontrolset\somebadkey registry keys to replace with dummy: hku\.default\somebadkey hklm\software\some long key name Comment: note that HKLM and HKU as well as HKEY_LOCAL_MACHINE and HKEY_USERS are accepted (case-insensitive as always). Also note that some long key name is a perfectly valid key name, and will be recognized since only leading and trailing whitespace is stripped (although if you are ever uncertain you can always add (7 of 12)12/19/2007 2:47:01 AM
8 quotes ). registry values to delete: HKEY_USERS\.default\badkey somebadvalue COMMENT: Note the use of the pipe syntax again to separate registry key names from registry value names in the registry values to delete: command. Registry values to replace with dummy: HKLM\SomeKeyPath\Blah\Blah somevalue programs to launch on reboot: %systemdrive%\mybatch.bat drivers to unload: BadServiceName COMMENT: The syntax for drivers to unload: is just to list the Service name of any driver you want unloaded. This would be the Service Name, as opposed to the Display Name usually visible in services. msc. The Service name is also the name of the subkey under HKLM \System\CurrentControlSet\Services. This is a valid script file. As another example without the cluttering comments, here is a similar script file, but greatly simplified. Files to delete: C:\test.txt Registry keys to delete: HKLM\Software\Test (8 of 12)12/19/2007 2:47:01 AM
9 Give it a try! This sample script file is uploaded at swandog46.geekstogo.com/samplescript.txt. Create a fake file called c:\test.txt, and a fake registry key called HKEY_LOCAL_MACHINE\Software\Test, and then download and run The Avenger. Select Load script from Internet URL, and in the address bar paste the URL Then click the green light icon, and reboot, and watch what happens! C:\test.txt will be deleted and backed up to C: \Avenger, as will HKLM\Software\Test. The entire process will be logged to C:\avenger.txt (assuming your %systemdrive% is C:\ ). (3) Command Line Arguments and Usage The Avenger may be run with full functionality from the command line, and the GUI may be completely suppressed in order for Avenger to be combined into larger scripts and malware fixes. If the /nogui flag is specified on the command line the GUI will be suppressed, and then other command line arguments will be checked. (All other command line arguments are ignored if / nogui is not specified.) The command line flags are: /nogui suppresses GUI. /q Quiet Mode. Suppresses warnings and informational messages, but not errors (9 of 12)12/19/2007 2:47:01 AM
10 /qq Silent Mode. Suppresses all messages except for fatal errors that require termination. Please use this flag sparingly since it suppresses some nonfatal errors that you should otherwise know about! /r Reboot Automatically. Ignored if not Silent Mode. Reboots automatically after setup, without prompting user first. /s ScriptLocation redirect script. Avenger will look for the script to load at ScriptLocation. This may either be a file path or a web URL (if a web URL it must contain a prefix " to let the program know). You may also enclose paths in quotes if there is any concern about spacing. If this flag is not set, Avenger looks for a script file at script.txt in the current working directory. If set, /s should be the last flag on the command line. So the full command line usage is: avenger.exe /nogui [/q] [/qq [/r]] [/s ScriptLocation] When The Avenger is run from the command line, it will return a 1 to the environment if it fails, and a 0 if it succeeds (Unix style). I think (although I haven't tested it) that you could test for its success by using IF NOT ERRORLEVEL 1 in a batch. (4) License, Credits, and Acknowledgements Permission is granted to use The Avenger freely for noncommercial purposes, but insofar as I have the legal right to do so, I insist please that The Avenger not be incorporated into other software, hosted, mirrored, or otherwise (10 of 12)12/19/2007 2:47:01 AM
11 redistributed in any way without my express permission. Please see my main tools page for more information. In addition, by using The Avenger you agree that you do so at your own risk, with full knowledge that I provide absolutely no warranty whatsoever or guarantee of the program s safety. Thank you very much to everyone who provided me feedback and helped in beta testing. I know that I will not be able to list every single person here, and if I missed you I apologize, and thank you too! But I wish to express the greatest gratitude to miekiemoes, IMM, Assarbad, LonnyRJones, Mosaic1, Grinler, Nigel, jedi, and many others. I would also like to acknowledge that I utilize the Info-ZIP compression software in this program, and as per their licensing requirements, below are the full contents of the Info-ZIP license: This is version 2005-Feb-10 of the Info-ZIP copyright and license. The definitive version of this document should be available at ftp://ftp.info-zip.org/pub/infozip/license.html indefinitely. Copyright (c) Info-ZIP. All rights reserved. For the purposes of this copyright and license, "Info-ZIP" is defined as the following set of individuals: Mark Adler, John Bush, Karl Davis, Harald Denker, Jean-Michel Dubois, Jean-loup Gailly, Hunter Goatley, Ed Gordon, Ian Gorman, Chris Herborth, Dirk Haase, Greg Hartwig, Robert Heath, Jonathan Hudson, Paul Kienitz, David Kirschbaum, Johnny Lee, Onno van der Linden, Igor Mandrichenko, Steve P. Miller, Sergio Monesi, Keith Owens, George Petrov, Greg Roelofs, Kai Uwe Rommel, Steve Salisbury, Dave Smith, Steven M. Schweda, Christian Spieler, Cosmin Truta, Antoine Verheijen, Paul von Behren, Rich Wales, Mike White (11 of 12)12/19/2007 2:47:01 AM
12 This software is provided "as is," without warranty of any kind, express or implied. In no event shall Info-ZIP or its contributors be held liable for any direct, indirect, incidental, special or consequential damages arising out of the use of or inability to use this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. Redistributions of source code must retain the above copyright notice, definition, disclaimer, and this list of conditions. 2. Redistributions in binary form (compiled executables) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution. The sole exception to this condition is redistribution of a standard UnZipSFX binary (including SFXWiz) as part of a self-extracting archive; that is permitted without inclusion of this license, as long as the normal SFX banner has not been removed from the binary or disabled. 3. Altered versions--including, but not limited to, ports to new operating systems, existing ports with new graphical interfaces, and dynamic, shared, or static library versions--must be plainly marked as such and must not be misrepresented as being the original source. Such altered versions also must not be misrepresented as being Info-ZIP releases--including, but not limited to, labeling of the altered versions with the names "Info-ZIP" (or any variation thereof, including, but not limited to, different capitalizations), "Pocket UnZip," "WiZ" or "MacZip" without the explicit permission of Info-ZIP. Such altered versions are further prohibited from misrepresentative use of the Zip-Bugs or Info-ZIP addresses or of the Info-ZIP URL(s). 4. Info-ZIP retains the right to use the names "Info-ZIP," "Zip," "UnZip," "UnZipSFX," "WiZ," "Pocket UnZip," "Pocket Zip," and "MacZip" for its own source and binary releases. Please note that my adherence to the Info-ZIP licensing requirements IN NO WAY implies that anyone may redistribute The Avenger in similar fashion. Any and all redistributions of The Avenger are STRICTLY PROHIBITED as discussed above. Please report any bugs or comments, good or bad, to me at Swandog46 [at] mvps [dot] org. Enjoy The Avenger! Back to Tools Home (12 of 12)12/19/2007 2:47:01 AM
RollPod Configurator. User guide
User guide 2002-2005 Snell & Wilcox Ltd. www.snellwilcox.com Snell & Wilcox Ltd., Southleigh Park House, Eastleigh Road, Havant, Hants, PO9 2PE, United Kingdom. For technical assistance contact: Tel: +44
More informationUtility. User's Manual. Overview. Using the Utility. M Rev.C
Utility User's Manual Overview Descriptions of the BA-T500II Utility features, operating environment, and installation/uninstallation Using the Utility Descriptions of how to use the BA-T500II Utility
More informationEPSON. Network Guide
EPSON Network Guide Copyright and Trademarks All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,
More informationEpson Stylus Pro WT7900. Network Guide
Epson Stylus Pro WT7900 Network Guide Copyright and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Product version: 10.2 Document date: September 2012 Contents 1 Before you begin...3 2 Install Sophos Endpoint Security and Control...4 3 Configure
More informationOracle Utilities Quotations Management
Oracle Utilities Quotations Management User s Guide Release 1.6.1.21 for Windows E18214-22 November 2015 Oracle Utilities Quotations Management/Quotations Management User s Guide, Release 1.6.1.21 for
More informationToon Boom Harmony 11.1 Control Center and Server Guide
Toon Boom Harmony 11.1 Control Center and Server Guide 1 1 Toon Boom Harmony 11.1 Control Center and Server Guide Legal Notices Toon Boom Animation Inc. 4200 Saint-Laurent, Suite 1020 Montreal, Quebec,
More informationEpsonNet b/g Wireless and 10/100 Base Tx Ext. Print Server
EpsonNet 802.11b/g Wireless and 10/100 Base Tx Ext. Print Server No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying,
More informationOracle Utilities Load Analysis
Oracle Utilities Load Analysis User s Guide Release 1.10.0.0 for Windows E18234-01 August 2010 Oracle Utilities Load Analysis User s Guide, Release 1.10.0.0 for Windows E18234-01 Copyright 1999, 2010 Oracle
More informationNetwork Guide NPD EN
NPD5040-00 EN Contents Contents Introduction Notices... 3 About this manual... 3 Caution, Important and Note... 3 Operating System Versions... 3 Network Basics... 4 Wi-Fi (wireless) network... 4 Ethernet
More informationTL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow.
TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow. ********License agreement for libpng library******** This copy of the libpng notices is
More informationDeploymentManager Ver6.0
DeploymentManager Ver6.0 First Step Guide -First Edition - Rev.001 Copyright NEC 2003-2011. All rights reserved. Disclaimers All information disclosed in this document is protected by the copyrights of
More informationUser s Guide NPD EN
NPD4075-00 EN Copyrights and Trademarks Copyrights and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,
More informationUser Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc.
User Manual TextWrangler THE Text Editor for Anyone who Types Bare Bones Software, Inc. TextWrangler 4.5.3 Product Design Product Engineering Documentation Additional Engineering Icon Design PHP keyword
More informationUser s Guide NPD EN
NPD3903-00 EN Copyrights and Trademarks Copyrights and Trademarks No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,
More informationUser Manual. TextWrangler. THE Text Editor for Anyone who Types. Bare Bones Software, Inc.
User Manual TextWrangler THE Text Editor for Anyone who Types Bare Bones Software, Inc. TextWrangler 5.5 Product Design Product Engineering Documentation Additional Engineering Icon Design Factory Text
More informationMigration Tool. Migration Tool (Beta) Technical Note
Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationHyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide
Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc..
More informationPacket Trace Guide. Packet Trace Guide. Technical Note
Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationMoodle. Moodle. Deployment Guide
Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationEpic. Epic Systems. Deployment Guide
Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are
More informationDENICOMP SYSTEMS Copyright? 2003 Denicomp Systems All rights reserved.
Copyright? 2003 Denicomp Systems All rights reserved. Table of Contents INTRODUCTION TO WINSOCK RSHD/NT...1 REQUIREMENTS...1 SECURITY A WARNING...1 WINSOCK RSHD/NT INSTALLATION...2 INSTALLING FROM A CD
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationUser Manual. Date Aug 30, Enertrax DAS Download Client
EnertraxDL - DAS Download Client User Manual Date Aug 30, 2004 Page 1 Copyright Information Copyright 2004, Obvius Holdings, LLC. All rights reserved. Redistribution and use in source and binary forms,
More informationAdobe Connect. Adobe Connect. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationSophos Endpoint Security and
Sophos Endpoint Security and Control Sophos Endpoint Security and Control 10.3 Sophos Anti-Virus HIPS (Host Intrusion Prevention System) Rootkit Sophos Behavior Monitoring HIPS Windows Sophos Live Protection
More informationNTLM NTLM. Feature Description
Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationUser Manual. BBEdit. Professional Code and Text Editor for the Macintosh. Bare Bones Software, Inc.
User Manual BBEdit Professional Code and Text Editor for the Macintosh Bare Bones Software, Inc. BBEdit 12.1.2 Product Design Product Engineering Engineers Emeritus Documentation Additional Engineering
More informationRSA Two Factor Authentication
RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationLoadMaster VMware Horizon (with View) 6. Deployment Guide
LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the
More informationMAGPICK - magnetic map & profile processing. User Guide.
MAGPICK - magnetic map & profile processing. User Guide. Mikhail Tchernychev. 16/02/98 Beta version of the manual - last revised 12/12/2013 Contents 1 Copyrights 6 1.1 MagPick Copyright Notice...............................
More informationv13.03 Dialog Box Reference ni.com/awr
v13.03 Dialog Box Reference ni.com/awr Dialog Box Reference NI AWR Design Environment v13.03 Edition 1960 E. Grand Avenue, Suite 430 El Segundo, CA 90245 USA Phone: +1 310.726.3000 Fax: +1 310.726.3005
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.7 28 February 2019 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationSDN Adaptive Load Balancing. Feature Description
SDN Adaptive Load Balancing Feature Description VERSION: 5.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationGMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation
GMI-Cmd.exe Reference Manual GMI Command Utility General Management Interface Foundation http://www.gmi-foundation.org Program Description The "GMI-Cmd.exe" program is a standard part of the GMI program
More informationLoadMaster Clustering
Introduction LoadMaster Clustering Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
More informationVersion 4.2. ch2m.com/floodmodeller
ch2m.com/floodmodeller Version 4.2 Flood Modeller Pro / Flood Modeller Free Release notes Flood Modeller v4.2 is a significant upgrade to the last release (v4.1.1). It introduces new functionality and
More informationVMware vcenter Log Insight Manager. Deployment Guide
VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More information[The BSD License] Copyright (c) Jaroslaw Kowalski
Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution
More informationv14 Dialog Box Reference ni.com/awr
v14 Dialog Box Reference ni.com/awr Dialog Box Reference NI AWR Design Environment v14 Edition 1960 E. Grand Avenue, Suite 430 El Segundo, CA 90245 USA Phone: +1 310.726.3000 Fax: +1 310.726.3005 Website:
More informationEdge Security Pack (ESP)
Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..
More informationSpanDisc. U s e r s G u i d e
SpanDisc U s e r s G u i d e Introduction SpanDisc User s Guide SpanDisc is a complete disc archival and backup solution. SpanDisc uses the automation features or Rimage Corporation s Digital Publishing
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.3.0 2 May 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and
More informationFile Servant User Manual
File Servant User Manual Serve files over FTP and HTTP - at the snap of a finger! File Servant is free software (see copyright notice below). This document was last revised Monday 28 February 2011. Creator:
More information1 What is SecExClipboard...? 2 Making your... SecExClipboard Disk 3 Using Your... SecExClipboard Disk
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is...? 2 2 Making your... Disk 4 3 Using Your... Disk 7 4 Acknowledgements... 8 Part II About 10 1 About... 10 2 About Bytefusion...
More informationCharacter Tools. Version May 2005 A shareware plug-in for FrameMaker. Copyright
Character Tools Version 1.3 - May 2005 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2005-2007 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved
More informationConverged Network Analyzer Command Reference Guide Addendum
Converged Network Analyzer Command Reference Guide Addendum for the Converged Network Analyzer (CNA), Adaptive Path Controller-Enterprise (APC-E), Adaptive Path Controller-Internet (APC-I), and the CNA
More informationKEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide
KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.1.1 2 November 2017 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationUser Scripting April 14, 2018
April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.4.0 7 August 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationDME-N Network Driver Installation Guide for M7CL
DME-N Network Driver Installation Guide for M7CL ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED
More informationJPdfBookmarks Manual. by Flaviano Petrocchi
JPdfBookmarks Manual by Flaviano Petrocchi JPdfBookmarks Manual 1 Introduction 3 Installation and Uninstallation 4 Linux Instructions 4 Debian Instructions 6 Windows Instructions 6 Universal Archive Instructions
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.6 5 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationJMP to LSAF Add-in. User Guide v1.1
JMP to LSAF Add-in User Guide v1.1 Table of Contents Terms and Conditions... 3 System Requirements... 3 Installation... 3 Configuration... 4 API Setup... 4 Java Configuration... 5 Logging In... 5 Launching
More informationTWAIN driver User s Guide
4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1
More informationConfiguring Real Servers for DSR
Configuring Real Servers for DSR VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..
More informationParagraph Tools. Version May 2005 A shareware plug-in for FrameMaker. Copyright
Paragraph Tools Version 2.1 - May 2005 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2001-2007 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved
More informationNCD ThinPATH PC Installation Guide and Release Notes
NCD ThinPATH PC Installation Guide and Release s Copyright Copyright 2001 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network
More informationVeritas NetBackup Add-in for Microsoft SCVMM Console Guide. Release 8.1
Veritas NetBackup Add-in for Microsoft SCVMM Console Guide Release 8.1 Veritas NetBackup Add-in for Microsoft SCVMM Console Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.
More informationJANUARY Conversion Software User Guide for UNIX. Version 2.0
JANUARY 2018 CDS Conversion Software User Guide for UNIX Version 2.0 USPS CDS Conversion Software Agreement This legal document is an agreement between you, the User of this software, and the United States
More informationSPListX for SharePoint Installation Guide
SPListX for SharePoint Installation Guide Product Description... 2 System Requirements and Recommendations... 3 Upgrade to the latest version of SPListX for SharePoint... 11 1 Product Description SPListX
More informationBEST PRACTICES FOR DOCKER
BEST PRACTICES FOR DOCKER DG-08863-001 _v001 December 2018 Best Practices TABLE OF CONTENTS Chapter 1. NVIDIA Container Best Practices...1 1.1. Hello World For Containers... 1 1.2. Logging Into Docker...
More informationBar Code Discovery. Administrator's Guide
Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008
IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,
More informationPreface. Audience. Cisco IOS Software Documentation. Organization
This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are
More informationRestaurant Enterprise Solution (RES) Version 5, Generation 2 Prerequisite Patch Documentation
Restaurant Enterprise Solution (RES) Version 5, Generation 2 Prerequisite Patch Documentation General Information About This Document This documentation describes the RES Prerequisites Patch. This document
More informationTOOLS for n Version2 Update Guide
TOOLS for n Version2 Update Guide SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS SOFTWARE
More informationVersion December 2011 A shareware plug-in for FrameMaker. Copyright 2011
Color Tools Version 1.0 - December 2011 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2011 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved Copyright
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationKomodo CAN Interface. Komodo TM CAN Interface GUI. Komodo GUI User s Manual v1.50 Octorber 26, 2012
Komodo CAN Interface Komodo GUI User s Manual v1.50 Octorber 26, 2012 Summary The Komodo GUI is a graphical application for use with the Komodo CAN Interface. The application provides access to CAN Bus
More informationPingStation User and Installation Guide
PingStation User and Installation Guide REVISION D UAV-1001358-001 Page 1 25 UAV-1001358-001 Page 2 25 2017 uavionix Corporation. All rights reserved. uavionix Corporation 380 Portage Ave. Palo Alto, CA
More informationVariable Tools. Version December 2011 A shareware plug-in for FrameMaker. Copyright 2011
Variable Tools Version 1.0 - December 2011 A shareware plug-in for FrameMaker www.siliconprairiesoftware.com Copyright 2011 Portions Copyright 1986-2002 Adobe Systems Incorporated All Rights Reserved Copyright
More informationLoadMaster Clustering (Beta)
Introduction LoadMaster Clustering (Beta) Feature Description VERSION: 5.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009
IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose
More informationScott Auge
Scott Auge sauge@amduus.com Amduus Information Works, Inc. http://www.amduus.com Page 1 of 14 LICENSE This is your typical BSD license. Basically it says do what you want with it - just don't sue me. Written
More informationUNIX and Linux Essentials Student Guide
UNIX and Linux Essentials Student Guide D76989GC10 Edition 1.0 June 2012 D77816 Authors Uma Sannasi Pardeep Sharma Technical Contributor and Reviewer Harald van Breederode Editors Anwesha Ray Raj Kumar
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS BACKGROUND: This agreement applies as between you, the User of this Website and NWM, the owner(s) of this Website. Your agreement to comply with and be bound by these terms and conditions
More informationVeritas NetBackup for Lotus Notes Administrator's Guide
Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016
More informationMS Lync MS Lync Deployment Guide
MS Lync 2013 Deployment Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationScribe Insight Installation Guide. Version August 10, 2011
Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form
More informationCA File Master Plus. Release Notes. Version
CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
More informationSysInfoTools PST Compress and Compact v5.0
SysInfoTools PST Compress and Compact v5.0 Table Of Contents 1. SysInfoTools PST Compress and Compact v5.0... 2 2. Overview... 2 3. Getting Started... 3 3.1 Installation Procedure... 3 4. Order and Activation...
More informationWeb Application Firewall (WAF) Feature Description
Web Application Firewall (WAF) Feature Description VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationPerfect Time Pro v User Manual
Perfect Time Pro v 2.0 - User Manual With Perfect Time Pro Version 2.0, we have combined two of our very successful product lines into one comprehensive time management solution. Merging our Point Of Entry
More informationSonicWall Global VPN Client Getting Started Guide
SonicWall Global VPN Client 4.10 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the
More informationALLIEDVIEW-UM 1.6 USER'S GUIDE
ALLIEDVIEW-UM 1.6 USER'S GUIDE PN 613-000381 Rev B Page 1 of 129 Copyright 2002-2007 Allied Telesis K. K. All rights reserved. No part of this publication may be reproduced without prior written permission
More informationNET SatisFAXtion TM Configuration Guide For use with AT&T s IP Flexible Reach Service And IP Toll Free Service
NET SatisFAXtion TM Configuration Guide For use with AT&T s IP Flexible Reach Service And IP Toll Free Service Version 0.9b 2008-02-01 Page 1 of 20 TABLE OF CONTENTS 1 Introduction... 3 2 Special Notes...
More informationMagicInfo Express Content Creator
MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.
More informationSAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August
PUBLIC Document Version: August 2018 2018-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Release Highlights....3 1.1 Anonymous access to public communities....4
More informationThe customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.
In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation
More informationGetting Started (No installation necessary) Windows On Windows systems, simply double click the AntGram icon to launch the program.
AntGram (Windows) Build 1.0 (Released September 22, 2018) Laurence Anthony, Ph.D. Center for English Language Education in Science and Engineering, School of Science and Engineering, Waseda University,
More informationClient Portal Client User Manual
Client Portal Client User Manual Version 2.0 Contents Client Portal User Manual... 3 Groups and User Levels... 3 Inviting Users... 5 Terms of Use... 9 Removing Users... 12 Password Reset... 14 List Items
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationMyCreditChain Terms of Use
MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have
More informationServerStatus Installation and Operation Manual
ServerStatus Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com ServerStatus Installation
More informationVISUDO(8) System Manager s Manual VISUDO(8)
NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file
More informationOneBridge Mobile Groupware 5.0
OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal
More informationOne Identity Manager Administration Guide for Connecting to SharePoint
One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More information